SlideShare a Scribd company logo
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
PAULA MUSICH
Research Director
Enterprise Management Associates
TLS 1.3 Adoption
in the Enterprise
Growing Encryption Use Extends
to New Standard
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING2 © 2019 Enterprise Management Associates
Watch the On-Demand Webinar
• TLS 1.3 Adoption in the Enterprise: Growing
Encryption Use Extends to New Standard On-
Demand webinar is available here:
http://info.enterprisemanagement.com/tls13-
adoption-webinar-ws
• Check out upcoming webinars from EMA here:
http://www.enterprisemanagement.com/freeResearch
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING3 © 2019 Enterprise Management Associates
Today’s Speaker
PAULA MUSICH, Research Director, EMA
Paula brings over 30 years of experience covering the IT
security and networking technology markets. She has been
an IT security analyst for over nine years, most recently as a
research director at NSS Labs, and earlier as principal
analyst for enterprise security for Current Analysis. As a
security technology analyst Paula has tracked and analyzed
competitive developments in the threat management segment
of the information security market, ranging from advanced
anti-malware to next generation firewalls and intrusion
prevention systems to content security, data loss prevention
and more.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING4 © 2019 Enterprise Management Associates
Logistics
An archived version of the event recording
will be available at
www.enterprisemanagement.com
• Log questions in the chat panel located on
the lower left-hand corner of your screen
• Questions will be addressed during the
Q&A session of the event
QUESTIONS
EVENT RECORDING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING5 © 2019 Enterprise Management Associates
TSL 1.3 Adoption Research Sponsors
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING6 © 2019 Enterprise Management Associates
Agenda
• Introduction, Methodology, Demographics
• TLS 1.3 Adoption Key Findings
• Drivers Behind TLS 1.3 Enablement
• Tradeoffs with TLS 1.3
• Strategies for Enabling TLS 1.3
• Encryption Usage and Trends
• Wrap Up & Q&A
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Introduction, Methodology,
Demographics
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Introduction and Methodology
TLS 1.3 Finally Debuts
• 10 years in the making
• The benefits:
• Reduced latency
• End to end privacy
• Better end user experience
• The downsides
• Lost visibility for security and
troubleshooting
Methodology
• Survey 249 IT pros involved
in security and IT
management
• 67% security is primary role
• 40% IT
Director/Manager/Supervisor
• 15% CIO/CTO/VP-IT
• 12% CSO/CISO/IT Security
Director
8 © 2019 Enterprise Management Associates
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Slide 9 © 2019 Enterprise Management Associates, Inc.
Demographics
• Company size
• 6% small enterprise (250-499 people)
• 12% midsized enterprise (500-999)
• 68% large enterprise (1,000-19,999)
• 13% very large enterprise (20,000 +)
• Revenue
• $10 to less than $20 million (4%)
• $20 million to <$100 million (29%)
• $100 million to 1 billion+ (33%)
• IT Budget
• 27% $1 million to <$10 million
• 23% $10 million to <$25 million
• 19% $25 million to <$50 million
• 12% $50 million to <$100 million
• 12% $100 million +
• Vertical Industries
• High Technology (29%)
• Finance/banking/insurance (16%)
• Retail/wholesale (13%)
• Healthcare/Pharma (10%)
• Telecommunications (8%)
• Education (7%)
• Geography
• Primarily serve North America
• Notable
• No more than 15% not aware of/not
involved in TLS 1.3 enablement
• 61% very familiar with TLS 1.3 on
technical level
• 42% part of technical enablement
team
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
TLS 1.3 Enablement
Key Findings
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING11 © 2019 Enterprise Management Associates
Yes, there are concerns…
Security and Operational Concerns for Enabling TLS 1.3
7%
37%
34%
22%
9%
30%
40%
21%
We are not at all
concerned
We are only slightly
concerned
We have some concerns
We have significant
concerns
Operational concerns Security concerns
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING12 © 2019 Enterprise Management Associates
But Enablement is Moving Full Steam Ahead
The big surprise is that enablement/adoption of TLS 1.3 is
moving quickly for inbound connections and internal traffic
2%
32%
41%
17%
6%
3%
40%
34%
14%
6%
Not planning to enable TLS 1.3
at this time
Already underway
Within 6 months
7-12 months
13-18 months
Inbound connections Internal traffic
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Drivers Behind
TLS 1.3 Enablement
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING14 © 2019 Enterprise Management Associates
Why move to TLS 1.3?
Top motivations are privacy and data security
• 73% cite improved data security as a very important
motivator to adopt TLS 1.3 for their organizations
• 67% cite improved privacy for end to end security as a
very important motivator to adopt
• Only 44% cite decreased latency/TLS session setup
time as very important, despite 0-RTT advancement
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING15 © 2019 Enterprise Management Associates
Other reasons to move to TLS 1.3
Influence by the big boys – namely Apple, Google & Microsoft
63%
33%
3%
It forces us to accelerate our plan
It has no impact on our plan
It forces us to slow our plan down
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tradeoffs with TLS 1.3
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING17 © 2019 Enterprise Management Associates
Potential lost visibility a concern, but how much?
Lost visibility into inbound and internal traffic is a concern,
but no 5 alarm bells for some
9%
32%
24%
16%
19%
Not at all concerned
Somewhat concerned
Concerned
Very concerned
Extremely concerned
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING18 © 2019 Enterprise Management Associates
Lost Visibility Top Security Worries by Activity
Four potential issues caused by lost visibility and
level of concern
1. Monitoring Application Security tops the list
2. Detecting Lateral Attack Movement comes in 2nd
3. Troubleshooting Application Performance a distant 3rd
4. Detecting attacker reconnaissance not so much
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING19 © 2019 Enterprise Management Associates
Lost Visibility Top Security Worries by Location
No surprise data center tops the list
14%
24%
27%
13%
11%
4%
4%
4%
Campus
Core
Data center
Branch
Connection to cloud resources
East-west visibility for private cloud
East-west visibility for public cloud
DMZ
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING20 © 2019 Enterprise Management Associates
Certificate Encryption:
Better Privacy, Worse Security?
• TLS 1.3 Certificate Encryption Intent: Improve Privacy
• TLS 1.3 Certificate Encryption Impact: Poorer Security
• Use of free “Let’s Encrypt” SSL Certificate Authority drove dramatic
increase in usage of web’s HTTPS protocol
• Adoption rate of “Let’s Encrypt” by malware authors explodes
• Without visibility into certificate, you can’t see if the certificate was
self-signed by a malware author
• TLS 1.3 Certificate Encryption: Security or Operational
Issue?
• 38% more of a security issue
• 33% more of an operational issue
• 20% both
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Strategies for
Enabling TLS 1.3
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING22 © 2019 Enterprise Management Associates
Enablement not a question of if…
Will enabling TLS 1.3 require a change in your security
architecture?
Yes, significant
change, 45%
Yes, but not
significant
change, 50%
No change,
5%
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING23 © 2019 Enterprise Management Associates
Enablement a question of how
• Respondents mulling multiple strategies for enabling
TLS 1.3
• Replace existing stateful inspection firewalls with proxy-
based firewalls
• Maintain existing firewalls at earlier versions of TLS for as
long as possible
• Look for inline alternatives that enable decryption and
inspection by existing security controls without exacting a
big performance penalty
• Enable decryption and re-encryption on existing inline
security devices and hope it that it doesn’t add too much
latency, complexity or security vulnerability
• Look for out of band decryption solutions that enable
decryption and inspection without exacting a significant
performance penalty
• Of the 5 different strategies, top choices varied by
size of organization
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING24 © 2019 Enterprise Management Associates
Top strategies for large/very large enterprises
56%
55%
48%
49%
52%
52%
43%
38%
Maintain existing firewalls at earlier versions of TLS for
as long as possible
Enable decryption and re-encryption on existing inline
security devices and hope that it doesn’t add too much
latency, complexity, or security vulnerability
Look for inline alternatives that enable decryption and
inspection by existing security controls without exacting
a significant performance penalty
Replace existing stateful inspection firewalls with
proxy-based firewalls
Enterprise (All) VL Enterprise
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING25 © 2019 Enterprise Management Associates
Top Strategies for Mid-sized Organizations
63%
53%
46%
45%
Maintain existing firewalls at earlier versions of TLS for
as long as possible
Look for inline alternatives that enable decryption and
inspection by existing security controls without exacting a
significant performance penalty
Enable decryption and re-encryption on existing inline
security devices and hope that it doesn’t add too much
latency, complexity, or security vulnerability
Replace existing stateful inspection firewalls with proxy-
based firewalls
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING26 © 2019 Enterprise Management Associates
Top Strategies for SMBs
8%
31%
38%
54%
69%
Look for out-of-band decryption solutions that enable
decryption and inspection without exacting a significant
performance penalty
Enable decryption and re-encryption on existing inline
security devices and hope that it doesn’t add too much
latency, complexity, or security vulnerability
Look for inline alternatives that enable decryption and
inspection by existing security controls without exacting a
significant performance penalty
Maintain existing firewalls at earlier versions of TLS for as
long as possible
Replace existing stateful inspection firewalls with proxy-
based firewalls
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
35%
27%
16%
Encryption growth expected in next 18 months
Expect 1% - 25%
growth
Expect 26% - 50%
growth
Expect 51% to
75% growth
27 © 2019 Enterprise Management Associates
TLS 1.3 in the Context of Broader
Encryption Practices
• Overall encryption use in the enterprise is growing, and
TLS is the transport encryption method of choice.
• 29% mandate TLS 1.2; 22% mandate TLS 1.1; 17% already
mandate TLS 1.3
• Encryption Growth by the Numbers
31%
30%
17%
Encryption growth over last 18 months
Increased 26% -
50%
Increased 1% -
20%
Increased by
51% to 75%
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING28 © 2019 Enterprise Management Associates
Q&A
Get the report
http://bit.ly/2HDgHAl

More Related Content

What's hot

What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burns
Bill Burns
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 
Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response Program
Lancope, Inc.
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 

What's hot (20)

Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Infographic: Cloud Security & SMBs - What You Need to Know in 2015
Infographic: Cloud Security & SMBs - What You Need to Know in 2015Infographic: Cloud Security & SMBs - What You Need to Know in 2015
Infographic: Cloud Security & SMBs - What You Need to Know in 2015
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burns
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response Program
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATP
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
16231
1623116231
16231
 

Similar to TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New Standard

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 

Similar to TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New Standard (20)

TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
TLS 1.3: Expert Advice to Modernize Your Security and Decryption PracticesTLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
 
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...
TLS 1.3’s Fourth Anniversary:What Have We Learned About Implementation and N...TLS 1.3’s Fourth Anniversary:What Have We Learned About Implementation and N...
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
Network Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud WorldNetwork Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud World
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Achieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network MonitoringAchieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network Monitoring
 
The Value of Using Security Policy Orchestration and Automation for Improving...
The Value of Using Security Policy Orchestration and Automation for Improving...The Value of Using Security Policy Orchestration and Automation for Improving...
The Value of Using Security Policy Orchestration and Automation for Improving...
 
A Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception TechnologyA Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception Technology
 
Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...
Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...
Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...
 
Unlocking the ROI and Long-Term Benefits of SD-WAN
Unlocking the ROI and Long-Term Benefits of SD-WANUnlocking the ROI and Long-Term Benefits of SD-WAN
Unlocking the ROI and Long-Term Benefits of SD-WAN
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 

More from Enterprise Management Associates

More from Enterprise Management Associates (20)

Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
 
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New Standard

  • 1. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING PAULA MUSICH Research Director Enterprise Management Associates TLS 1.3 Adoption in the Enterprise Growing Encryption Use Extends to New Standard IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
  • 2. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING2 © 2019 Enterprise Management Associates Watch the On-Demand Webinar • TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New Standard On- Demand webinar is available here: http://info.enterprisemanagement.com/tls13- adoption-webinar-ws • Check out upcoming webinars from EMA here: http://www.enterprisemanagement.com/freeResearch
  • 3. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING3 © 2019 Enterprise Management Associates Today’s Speaker PAULA MUSICH, Research Director, EMA Paula brings over 30 years of experience covering the IT security and networking technology markets. She has been an IT security analyst for over nine years, most recently as a research director at NSS Labs, and earlier as principal analyst for enterprise security for Current Analysis. As a security technology analyst Paula has tracked and analyzed competitive developments in the threat management segment of the information security market, ranging from advanced anti-malware to next generation firewalls and intrusion prevention systems to content security, data loss prevention and more.
  • 4. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING4 © 2019 Enterprise Management Associates Logistics An archived version of the event recording will be available at www.enterprisemanagement.com • Log questions in the chat panel located on the lower left-hand corner of your screen • Questions will be addressed during the Q&A session of the event QUESTIONS EVENT RECORDING
  • 5. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING5 © 2019 Enterprise Management Associates TSL 1.3 Adoption Research Sponsors
  • 6. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING6 © 2019 Enterprise Management Associates Agenda • Introduction, Methodology, Demographics • TLS 1.3 Adoption Key Findings • Drivers Behind TLS 1.3 Enablement • Tradeoffs with TLS 1.3 • Strategies for Enabling TLS 1.3 • Encryption Usage and Trends • Wrap Up & Q&A
  • 7. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Introduction, Methodology, Demographics
  • 8. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Introduction and Methodology TLS 1.3 Finally Debuts • 10 years in the making • The benefits: • Reduced latency • End to end privacy • Better end user experience • The downsides • Lost visibility for security and troubleshooting Methodology • Survey 249 IT pros involved in security and IT management • 67% security is primary role • 40% IT Director/Manager/Supervisor • 15% CIO/CTO/VP-IT • 12% CSO/CISO/IT Security Director 8 © 2019 Enterprise Management Associates
  • 9. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Slide 9 © 2019 Enterprise Management Associates, Inc. Demographics • Company size • 6% small enterprise (250-499 people) • 12% midsized enterprise (500-999) • 68% large enterprise (1,000-19,999) • 13% very large enterprise (20,000 +) • Revenue • $10 to less than $20 million (4%) • $20 million to <$100 million (29%) • $100 million to 1 billion+ (33%) • IT Budget • 27% $1 million to <$10 million • 23% $10 million to <$25 million • 19% $25 million to <$50 million • 12% $50 million to <$100 million • 12% $100 million + • Vertical Industries • High Technology (29%) • Finance/banking/insurance (16%) • Retail/wholesale (13%) • Healthcare/Pharma (10%) • Telecommunications (8%) • Education (7%) • Geography • Primarily serve North America • Notable • No more than 15% not aware of/not involved in TLS 1.3 enablement • 61% very familiar with TLS 1.3 on technical level • 42% part of technical enablement team
  • 10. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING TLS 1.3 Enablement Key Findings
  • 11. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING11 © 2019 Enterprise Management Associates Yes, there are concerns… Security and Operational Concerns for Enabling TLS 1.3 7% 37% 34% 22% 9% 30% 40% 21% We are not at all concerned We are only slightly concerned We have some concerns We have significant concerns Operational concerns Security concerns
  • 12. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING12 © 2019 Enterprise Management Associates But Enablement is Moving Full Steam Ahead The big surprise is that enablement/adoption of TLS 1.3 is moving quickly for inbound connections and internal traffic 2% 32% 41% 17% 6% 3% 40% 34% 14% 6% Not planning to enable TLS 1.3 at this time Already underway Within 6 months 7-12 months 13-18 months Inbound connections Internal traffic
  • 13. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Drivers Behind TLS 1.3 Enablement
  • 14. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING14 © 2019 Enterprise Management Associates Why move to TLS 1.3? Top motivations are privacy and data security • 73% cite improved data security as a very important motivator to adopt TLS 1.3 for their organizations • 67% cite improved privacy for end to end security as a very important motivator to adopt • Only 44% cite decreased latency/TLS session setup time as very important, despite 0-RTT advancement
  • 15. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING15 © 2019 Enterprise Management Associates Other reasons to move to TLS 1.3 Influence by the big boys – namely Apple, Google & Microsoft 63% 33% 3% It forces us to accelerate our plan It has no impact on our plan It forces us to slow our plan down
  • 16. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tradeoffs with TLS 1.3
  • 17. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING17 © 2019 Enterprise Management Associates Potential lost visibility a concern, but how much? Lost visibility into inbound and internal traffic is a concern, but no 5 alarm bells for some 9% 32% 24% 16% 19% Not at all concerned Somewhat concerned Concerned Very concerned Extremely concerned
  • 18. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING18 © 2019 Enterprise Management Associates Lost Visibility Top Security Worries by Activity Four potential issues caused by lost visibility and level of concern 1. Monitoring Application Security tops the list 2. Detecting Lateral Attack Movement comes in 2nd 3. Troubleshooting Application Performance a distant 3rd 4. Detecting attacker reconnaissance not so much
  • 19. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING19 © 2019 Enterprise Management Associates Lost Visibility Top Security Worries by Location No surprise data center tops the list 14% 24% 27% 13% 11% 4% 4% 4% Campus Core Data center Branch Connection to cloud resources East-west visibility for private cloud East-west visibility for public cloud DMZ
  • 20. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING20 © 2019 Enterprise Management Associates Certificate Encryption: Better Privacy, Worse Security? • TLS 1.3 Certificate Encryption Intent: Improve Privacy • TLS 1.3 Certificate Encryption Impact: Poorer Security • Use of free “Let’s Encrypt” SSL Certificate Authority drove dramatic increase in usage of web’s HTTPS protocol • Adoption rate of “Let’s Encrypt” by malware authors explodes • Without visibility into certificate, you can’t see if the certificate was self-signed by a malware author • TLS 1.3 Certificate Encryption: Security or Operational Issue? • 38% more of a security issue • 33% more of an operational issue • 20% both
  • 21. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Strategies for Enabling TLS 1.3
  • 22. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING22 © 2019 Enterprise Management Associates Enablement not a question of if… Will enabling TLS 1.3 require a change in your security architecture? Yes, significant change, 45% Yes, but not significant change, 50% No change, 5%
  • 23. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING23 © 2019 Enterprise Management Associates Enablement a question of how • Respondents mulling multiple strategies for enabling TLS 1.3 • Replace existing stateful inspection firewalls with proxy- based firewalls • Maintain existing firewalls at earlier versions of TLS for as long as possible • Look for inline alternatives that enable decryption and inspection by existing security controls without exacting a big performance penalty • Enable decryption and re-encryption on existing inline security devices and hope it that it doesn’t add too much latency, complexity or security vulnerability • Look for out of band decryption solutions that enable decryption and inspection without exacting a significant performance penalty • Of the 5 different strategies, top choices varied by size of organization
  • 24. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING24 © 2019 Enterprise Management Associates Top strategies for large/very large enterprises 56% 55% 48% 49% 52% 52% 43% 38% Maintain existing firewalls at earlier versions of TLS for as long as possible Enable decryption and re-encryption on existing inline security devices and hope that it doesn’t add too much latency, complexity, or security vulnerability Look for inline alternatives that enable decryption and inspection by existing security controls without exacting a significant performance penalty Replace existing stateful inspection firewalls with proxy-based firewalls Enterprise (All) VL Enterprise
  • 25. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING25 © 2019 Enterprise Management Associates Top Strategies for Mid-sized Organizations 63% 53% 46% 45% Maintain existing firewalls at earlier versions of TLS for as long as possible Look for inline alternatives that enable decryption and inspection by existing security controls without exacting a significant performance penalty Enable decryption and re-encryption on existing inline security devices and hope that it doesn’t add too much latency, complexity, or security vulnerability Replace existing stateful inspection firewalls with proxy- based firewalls
  • 26. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING26 © 2019 Enterprise Management Associates Top Strategies for SMBs 8% 31% 38% 54% 69% Look for out-of-band decryption solutions that enable decryption and inspection without exacting a significant performance penalty Enable decryption and re-encryption on existing inline security devices and hope that it doesn’t add too much latency, complexity, or security vulnerability Look for inline alternatives that enable decryption and inspection by existing security controls without exacting a significant performance penalty Maintain existing firewalls at earlier versions of TLS for as long as possible Replace existing stateful inspection firewalls with proxy- based firewalls
  • 27. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING 35% 27% 16% Encryption growth expected in next 18 months Expect 1% - 25% growth Expect 26% - 50% growth Expect 51% to 75% growth 27 © 2019 Enterprise Management Associates TLS 1.3 in the Context of Broader Encryption Practices • Overall encryption use in the enterprise is growing, and TLS is the transport encryption method of choice. • 29% mandate TLS 1.2; 22% mandate TLS 1.1; 17% already mandate TLS 1.3 • Encryption Growth by the Numbers 31% 30% 17% Encryption growth over last 18 months Increased 26% - 50% Increased 1% - 20% Increased by 51% to 75%
  • 28. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING28 © 2019 Enterprise Management Associates Q&A Get the report http://bit.ly/2HDgHAl